Data file authentication device

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 28, 713165, H04L 900, H04K 100

Patent

active

061675164

DESCRIPTION:

BRIEF SUMMARY
BACKGROUND OF THE INVENTION

The invention concerns the field of certifying, or authenticating data files.
In certain fields, it is indispensable to certify documents to ensure that their contents cannot be contested. When the carrier of the document is paper, it is particularly easy to append a signature to each one of the pages of the said document, and to complete it, if necessary, by an appropriate marking as, for example, by punching.
However, this type of certification can be reproduced by an ill-intentioned person wishing to alter the contents of at least one part of the document concerned.
Moreover, the filing of documents certified on a paper carrier requires considerable filing space and renders their manipulation difficult.
Finally, the making of a certified copy conforming to an original certified document, or of an extract therefrom, requires many operations which increase the price and the time for obtaining it.
Thanks to recent developments in electronics, and more precisely in electronic information technology, it is henceforth possible to store the data of a document in a resident-type memory (a hard disk) or a removable memory (a 31/2 inch-type disk or a 51/4 inch type disk).
However, while it is possible to store the data of a document in a memory-type carrier, it is, on the other hand, not possible to store a physical marking, as, for example, a punch mark or a stamp in relief. In other words, it is possible for an ill intentioned person to alter the stored data of a document, without it being possible for this to be noticed, and then to destroy the original.
To remedy this major drawback, the expert has developed complex algorithms, as for example Bosset's algorithm. These algorithms are set out in detail, particular in the following works: des informations" (Against the risks of alterations, an information certifying system), 01 Informati-que, February 1977.
Bosset's algorithm operates on the non-commutative principle of matrix products, which makes it possible to effect a transformation of the data bits of a file stored in a source memory, which can only be inverted with difficulty.
Moreover, Knuth has developed a method aiming to improve the quality of a pseudorandom code generator. This method lies in inserting words into a source memory, and each time a bit is drawn from the memory in a random manner, it is replaced by its transform which is calculated by many operations. This method is set out in detail in the following works: Addison-Wesley, and pp.69-64, 1976.
Moreover, algorithms have been developed which are derived from a technique termed "rucksack" which lies in adding predetermined integers termed "increments", drawn in a pseudorandom manner from an increment memory, in the registers of a memory termed "rucksack".
These algorithms require, moreover, a source memory whose predetermined and fixed content serves to place during each processing of a file, a secret key intended to place the encryptation function into a parametric mode. The data bits of the file are not processed continuously, but in blocks, which permits various possible combinations with the same final result. In spite of the complexity of the processing operations undertaken, it is always possible to decode the file and to gain access to the secret key. In these conditions, it becomes possible to modify the data and then to encode them again.
Besides, irrespective of the efficiency of a cryptographic algorithm, the latter only provides an encrypted transform of the original file, and not a signature of the latter.


SUMMARY OF THE INVENTION

One of the objects of the present invention is to propose devices which all makes it possible without exception to produce by continuous processing, one and only one signature (or an authentication sequence) for a given file, and not a cryptography for the latter.
Another object of the invention is to propose a simple authentication device, which ensures that any alteration, even of a single bit of a data file, leads to a signature (or an authentication sequence) that is

REFERENCES:
patent: 4159468 (1979-06-01), Barnes et al.
patent: 4319079 (1982-03-01), Best
patent: 5351301 (1994-09-01), Benincasa
patent: 5454000 (1995-09-01), Dorfman
patent: 5584023 (1996-12-01), Hsu
patent: 5655021 (1997-08-01), Van Tilburg
patent: 5860099 (1999-01-01), Milios et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Data file authentication device does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Data file authentication device, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data file authentication device will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1006739

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.